Zenith Live is coming to Europe in October. Join us! Learn More
Zenith Live is coming to Europe in October. Join us!
Learn More

Zero trust security

Make it possible

Your Mission

 

Security Advisory - August 11, 2015

Zscaler Protects against Multiple Security Vulnerabilities in Internet Explorer and Microsoft Office

 

 

Zscaler, working with Microsoft through their MAPP program, has proactively deployed protections for the following 12 vulnerabilities included in the August 2015 Microsoft security bulletins. Zscaler will continue to monitor exploits associated with all vulnerabilities in the August release and deploy additional protections as necessary.

MS15-080 - Vulnerabilities in Microsoft Graphics Component Could Allow Remote Code Execution

Severity: Critical
Affected Software

  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2
  • Windows 8 and Windows 8.1
  • Windows Server 2012 and Windows Server 2012 R2
  • Windows RT and Windows RT 8.1
  • Windows 10

CVE-2015-2431 - Microsoft Office Graphics Component Remote Code Execution Vulnerability

Description: This security update resolves vulnerabilities in Microsoft Windows, Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft Silverlight. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted document or visits an untrusted webpage that contains embedded TrueType fonts.

MS15-081 - Vulnerabilities in Microsoft Office Could Allow Remote Code Execution

Severity: Critical
Affected Software

  • Microsoft Office 2007
  • Microsoft Office 2010
  • Microsoft Office 2013
  • Microsoft Office 2013 RT
  • Microsoft Office for Mac 2011
  • Microsoft Office for Mac 2016

CVE-2015-2477 - Microsoft Office Memory Corruption Vulnerability
CVE-2015-2470 - Microsoft Office Integer Underflow Vulnerability

Description: This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-079 - Cumulative Security Update for Internet Explorer

Severity: Critical
Affected Software

  • Internet Explorer 6-11

CVE-2015-2444 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2443 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2452 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2451 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2450 - Memory Corruption Vulnerability in Internet Explorer
CVE-2015-2448 - Memory Corruption Vulnerability in Internet Explorer

Description: This security update resolves vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

MS15-090Vulnerabilities in Microsoft Windows Could Allow Elevation of Privilege

Severity: Important
Affected Software

  • Windows RT and Windows RT 8.1
  • Windows Server 2012 and Windows Server 2012 R2
  • Windows 8 and Windows 8.1
  • Windows Server 2008 R2
  • Windows 7
  • Windows Server 2008
  • Windows Vista

CVE-2015-2429 –Windows Registry Elevation of Privilege Vulnerability

Description: This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application or convinces a user to open a specially crafted file that invokes a vulnerable sandboxed application, allowing an attacker to escape the sandbox.

MS15-091Cumulative Security Update for Microsoft Edge

Severity: Critical
Affected Software

  • Microsoft Edge

CVE-2015-2442 – Memory Corruption Vulnerability
CVE-2015-2446 – Memory Corruption Vulnerability

Description: This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Microsoft Edge. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.